The process of integrating a project using the Bazel build system with OSS-Fuzz is very similar to the general Setting up a new project process. The key specifics of integrating a Bazel project are outlined below.
For Bazel-based projects, we recommend using the
rules_fuzzing extension library for defining fuzz tests.
rules_fuzzing provides support for building and running fuzz tests under multiple sanitizer and fuzzing engine configurations. It also supports specifying corpora and dictionaries as part of the fuzz test definition.
The fuzzing rules provide out-of-the-box support for building and packaging fuzz test artifacts in the OSS-Fuzz format. Each
//path/to:fuzz_test fuzz test target automatically has a
//path/to:fuzz_test_oss_fuzz packaging target that (a) builds the fuzz test using the instrumentation and engine library specified in the OSS-Fuzz environment variables, and (b) generates an archive containing the binary and its associated artifacts (corpus, dictionary, etc.). Moreover, OSS-Fuzz provides a standard tool to automatically process these targets, substantially simplifying the
build.sh script (see below).
This section explains how to integrate the fuzz tests written using the
rules_fuzzing library with OSS-Fuzz. You can also see a complete example in the
The structure of the project directory in the OSS-Fuzz repository does not differ for Bazel-based projects. The project files have the following specific aspects.
Only C++ projects are currently supported.
Since the OSS-Fuzz target builds the fuzz test using the instrumentation and engine specified in the OSS-Fuzz environment variables, all the engine and sanitizer configurations supported in the
project.yaml file are automatically supported by the fuzzing rules.
There is no need to install Bazel in your Docker image. The OSS-Fuzz builder image provides the
bazel executable through the Bazelisk launcher, which will fetch and use the latest Bazel release. If your project requires a particular Bazel version, create a
.bazelversion file in your repository root with the desired version string.
build.sh script essentially needs to perform three steps: (1) selecting which fuzz tests to build, (2) building their OSS-Fuzz package targets in the right configuration, and (3) copying the build artifacts to the
OSS-Fuzz provides a
bazel_build_fuzz_tests tool that implements these steps in a standard way, so in most cases your build script only needs to invoke this command with no arguments.
If necessary, the behavior of the tool can be customized through a set of environment variables. The most common are:
BAZEL_EXTRA_BUILD_FLAGSare extra build flags passed on the Bazel command line.
BAZEL_FUZZ_TEST_EXCLUDE_TAGcan be overridden to specify which target tags to use when determining what fuzz tests to include. By default, the tool selects all the fuzz tests except for those tagged as
BAZEL_FUZZ_TEST_QUERYoverrides the Bazel query the tool uses to identify the fuzz tests to build, if the tag-based approach is not sufficient.